step1nx's profile picture. Hacking & Learning is a way to live life #🥨

step1nx

@step1nx

Hacking & Learning is a way to live life #🥨

Check this out! An open source project made with quality and ready to use! Cc. Thanks @tarekouldcheikh for your contribution to the info sec community over the years! cognito-api.com


step1nx a reposté

Side channel attacks for breaking the firmware encryption on ESP32 courk.cc/breaking-flash… #infosec #espressif

0xor0ne's tweet image. Side channel attacks for breaking the firmware encryption on ESP32

courk.cc/breaking-flash…

#infosec #espressif
0xor0ne's tweet image. Side channel attacks for breaking the firmware encryption on ESP32

courk.cc/breaking-flash…

#infosec #espressif

step1nx a reposté

🧵1/2 MIT's Charles Leiserson lectures on how C code is compiled into assembly and machine code, leading to hardware-level execution. 👇 Full MIT Performance Engineering of Software Systems Course in C and Assembly👇


step1nx a reposté

Person Attack Surface for OSINT Investigations Credit: @sinwindie #cybersecurity #infosec #OSINT

DailyDarkWeb's tweet image. Person Attack Surface for OSINT Investigations

Credit: @sinwindie

#cybersecurity #infosec #OSINT

step1nx a reposté

🚨We could bypass authentication to thousands of applications by exploiting a configuration-based vulnerability in AWS ALB. Here’s everything you need to know about the #ALBeast vulnerability discovered by @MiggoSecurity

liadeliyahu's tweet image. 🚨We could bypass authentication to thousands of applications by exploiting a configuration-based vulnerability in AWS ALB. Here’s everything you need to know about the #ALBeast vulnerability discovered by @MiggoSecurity

step1nx a reposté

Exploiting GitHub Actions jobs by registering a rogue #CICD runner to exfiltrate secrets, @hugow_vincent developed a tool for a real engagement, successfully compromising the GitHub organization! synacktiv.com/publications/h…


step1nx a reposté

I've made $500k+ from SSRF vulnerabilities. Here are my tricks:

hacker_'s tweet image. I've made $500k+ from SSRF vulnerabilities.

Here are my tricks:

step1nx a reposté

CVE-2022-26766: the CoreTrust bug "For years, macOS allowed any root certificate when checking code signatures, making code signing completely useless." // bug discovered by @LinusHenze // writeup by @zhuowei worthdoingbadly.com/coretrust/

0xdea's tweet image. CVE-2022-26766: the CoreTrust bug

"For years, macOS allowed any root certificate when checking code signatures, making code signing completely useless."

// bug discovered by @LinusHenze 
// writeup by @zhuowei 

worthdoingbadly.com/coretrust/

step1nx a reposté

The Swedish National CERT @cert_se has released a new CTF. The challenge is to find six flags in a PCAP file. cert.se/2022/09/cert-s…

netresec's tweet image. The Swedish National CERT @cert_se has released a new CTF. The challenge is to find six flags in a PCAP file.
cert.se/2022/09/cert-s…

step1nx a reposté

The Linux Booting Process Explained 🐧↓


step1nx a reposté

I just released the source code of Paracosme: a zero-click remote memory corruption exploit I demonstrated at Pwn2Own 2022 Miami 🐛🐜🪲 github.com/0vercl0k/parac…


step1nx a reposté

Here is the writeup for the io_uring Use-After-Free which @pqlqpql and me exploited in the kCTF VRP! We hope you enjoy :) ruia-ruia.github.io/2022/08/05/CVE…


step1nx a reposté

😐

cyb3rops's tweet image. 😐
cyb3rops's tweet image. 😐

step1nx a reposté

Hello 😀 Vous l'attendiez tous, on organise un meet "Not Before LeHack" car il sera pendant, le Vendredi 24 Juin à partir de 18h30, voici le lien pour vous inscrire 😉 framadate.org/PiEl4NlVM4n6qA… #infosec #rtfm #lehack


step1nx a reposté

Always impressed when seeing Hotel Card key with Mifare Ultralight EV1 🥳 Always depressed when seeing it is configured with: - pages don't need authentication - Unlimited password attempts - Found default password FF FF FF FF 🙄 Integrators can try to be serious? #proxmark3 😍


United States Tendances

Loading...

Something went wrong.


Something went wrong.